Skip to comments.
Report: ISIS Using Snowden Documents to Evade U.S. Intel Efforts
Free Beacon ^
| July 21, 2015
| Lachlan Markey
Posted on 07/21/2015 11:17:56 AM PDT by lbryce
The self-proclaimed Islamic State has used National Security Agency documents stolen by former contractor Edward Snowden to evade U.S. intelligence services, officials told the New York Times in a Tuesday story.
The Times reported that fact deep in a story on the groups efforts to evade and recover from American and Iraqi military strikes.
Documents stolen and leaked to reporters by Snowden, who remains in hiding in Russia, have led to changes in IS operations that have prevented U.S. forces from gathering intelligence on the group, the Times reported.
The Islamic State has also studied revelations from Edward J. Snowden, the former National Security Agency contractor, about how the United States gathers information on militants. A main result is that the groups top leaders now use couriers or encrypted channels that Western analysts cannot crack to communicate, intelligence and military officials said.
(Excerpt) Read more at freebeacon.com ...
TOPICS: Extended News; Government; News/Current Events; Russia
KEYWORDS: edwardsnowden; iran; isis; isissnowden; lebanon; russia; sleepercell; snowden; snowdendocs; traitor; treason
Navigation: use the links below to view more comments.
first previous 1-20, 21-26 last
To: lbryce
21
posted on
07/21/2015 6:13:19 PM PDT
by
timestax
(American Media = Domestic Enemy)
To: lbryce; SunkenCiv
22
posted on
07/21/2015 10:14:01 PM PDT
by
AdmSmith
(GCTGATATGTCTATGATTACTCAT)
To: AdmSmith
My best guess is, Snowden was recruited and groomed while still in high school.
23
posted on
07/22/2015 12:37:46 AM PDT
by
SunkenCiv
(What do we want? REGIME CHANGE! When do we want it? NOW)
To: SunkenCiv
Any idea about his FR name?
24
posted on
07/22/2015 7:01:50 AM PDT
by
AdmSmith
(GCTGATATGTCTATGATTACTCAT)
To: cynwoody
I presume this is a program or an app, but I don't recognize the language nor do I have a compiler.
25
posted on
07/26/2015 5:14:04 AM PDT
by
JoeFromSidney
( book, RESISTANCE TO TYRANNY, available from Amazon)
To: JoeFromSidney
/dev/random is an example of a facility to provide true randomness (entropy) extracted from a system's environment. E.g., whenever a keyboard or mouse event or network packet arrives, grab the least significant bit of the timestamp counter and add it to the entry pool. In extreme cases, hardware may be used to, for example, digitize thermal noise. Bits from the entropy pool are then used to seed cryptographic PRNGs to provide such things as TLS session keys.
26
posted on
07/26/2015 1:33:14 PM PDT
by
cynwoody
Navigation: use the links below to view more comments.
first previous 1-20, 21-26 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson